SlideShare a Scribd company logo
1 of 21
Digital Credentials
Enabling Mobility
and Verification of
Educational
Achievements
Brandon Muramatsu, MIT
Willem van Valkenburg, Delft University of Technology
Today
● A brief intro to the Digital Credentials
Consortium
● Two case studies
○ GDPR and Digital Credentials, Delft University of
Technology
○ Open Source Learner Credential Wallet, MIT
Digital Credentials Consortium
Our mission is to create a trusted,
distributed, and shared infrastructure
that will become the standard for issuing,
storing, displaying, and verifying
academic credentials, digitally.
DCC Founding Members
Delft University of Technology (The
Netherlands)
Georgia Institute of Technology (USA)
Harvard University (USA)
Hasso Plattner Institute, University of
Potsdam (Germany)
Massachusetts Institute of Technology
(USA)
McMaster University (Canada)
Tecnológico De Monterrey (Mexico)
Technical University of Munich
(Germany)
University of California at Berkeley
(USA)
University of California, Irvine (USA)
University of Milano-Bicocca (Italy)
University of Toronto (Canada)
DCC Guiding Principles
Learners
● Learners retain primary control
over their credentials.
● Learners’ consent is required for
issuance of digital credentials.
● Learners decide to whom they grant
access.
● Barriers to receiving and managing
credentials are minimal to enable
broad participation.
Issuers
● Issuers control to whom they issue
credentials, the particular achievement
that the credential represents, and
which credential options are available
to the learner.
● Issuers can revoke credentials
according to their institution’s policies.
● Barriers to issuing credentials are
minimal to enable broad and diverse
participation.
Trust:
● Everyone is able to review how the infrastructure and processes work.
● Trust in the integrity of the credentials is established cryptographically.
● Credentials can be verified without consulting the original issuer.
How does DCC do its work?
● Consortium of members with alignment to guiding principles,
and each working in similar ways on digital credentials
● DCC does its work through open standards organizations
primarily the W3C Verifiable Credentials for Education
(W3C VC-EDU) Community Group
○ Coordinates with IMS Global on Comprehensive Learner Record
and Open Badges v3 specifications
● Shared technical work through a Technical Working Group
made up of DCC members
● Implementing Verifiable Credentials (VC) and
Decentralized Identifiers (DID) specifications
○ Meet key DCC guiding principles of learner control
Delft University of Technology
General Data
Protection Regulation
and Blockchain
General Data Protection Regulation
(GDPR)
The European Union's General Data Protection Regulation become binding in
May 2018.
Goal of GDPR:
1. to facilitate free movement of personal data between EU members states
2. to establish a framework of fundamental data rights protection.
The legal framework creates a number of obligations resting on data controllers
(entities determining the means and purpose of data processing)
The legal framework creates a number of rights to data subjects (the natural
persons to whom the personal data relates) to be enforced by data controllers.
E.g. Article 16 GDPR – right to rectification, Article 17 GDPR – right to erasure
(‘right to be forgotten’)
Leading principles of GDPR
Lawfulness, fairness
and transparency
organisations need to make sure their data collection practices don’t break the law and that they
aren’t hiding anything from data subjects.
Purpose limitation Organisations should only collect personal data for a specific purpose, clearly state what that
purpose is, and only collect data for as long as necessary to complete that purpose.
Data minimisation Organisations must only process the personal data that they need to achieve its processing
purposes.
Accuracy The accuracy of personal data is integral to data protection. The GDPR states that “every
reasonable step must be taken” to erase or rectify data that is inaccurate or incomplete.
Storage limitation Organisations need to delete personal data when it’s no longer necessary.
Integrity and
confidentiality
(security)
Personal data should be processed in a manner that ensures appropriate security of the
personal data, including protection against unauthorised or unlawful processing and against
accidental loss, destruction or damage, using appropriate technical or organisational measures.
Accountability The controller shall be responsible for, and be able to demonstrate compliance with the above
principles
Source:https://www.bankinghub.eu/banking/finance-risk/gdpr-
deep-dive-implement-right-forgotten
GDPR and Blockchain
The GDPR is based on assumptions that creates tension with blockchain.
GDPR Blockchain
in relation to each personal data point there is at
least one natural or legal person – the data
controller – whom the subjects can address to
enforce their rights under EU Data protection law.
decentralizes to many actors and allocation of
responsibility and accountability is burdensome.
data can be modified or erased where necessary to
comply with the legal requirements of GDPR Article
16 (right to rectification) and 17 (right to erasure
(‘right to be forgotten’)
Modification and erasure of data is made onerous to
ensure data integrity and increase trust in the
network.
Personal data on the Blockchain?
In the pilot we explored the following:
● Is data that is encrypted or hashed/ ‘anonymized’ still
quality as personal data as per the GDPR requirements of
anonymisation?
● How is the right to erasure/right to be forgotten dealt with in
the pilot?
The right to be forgotten is not an absolute
right
● if a learner requests to be forgotten, Accredify
deletes their personal data. The learner is the
one who should contact institutes where they
have personally shared their opencert file
which could be still verified.
● What happens now is that Accredify deletes
personal data from their system which is
GDPR complaint. This is because the right to
be forgotten does not extend to all the
institutes where the learner shared their file.
● If a certificate is revoked and cannot be
verified in the future that doesn’t say much –
so it is good to add an explanation.
Hashing, salt and peppering of personal
data
● As long as the hash relates to something it is not
anonymised.
● This is the current conflict within blockchain and GDPR
and the interpretation of what is considered as
anonymous.
Open Source Learner Wallet
MIT
MIT Team
Brandon Muramatsu
Philipp Schmidt
Gillian Walsh
Dmitri Zagidulin
About the Open Source Learner Wallet Project
● A key missing ingredient in a digital credential infrastructure
○ Prioritizes learner agency
○ Enables trust
○ Supports diverse institutions
● A learner credential wallet specification (May 2021)
● An open source learner wallet mobile app, eduWallet
● A pilot with U.S. institutions:
○ College Unbound, Georgia Tech and San Jose City College
○ MIT xPRO and University of North Texas / Concentric Sky
Details on eduWallet
An Open Source Learner Wallet
● Both Android and iOS versions
○ Going into pilot testing December 2021–January 2022
● Key features
○ Login to secure wallet
○ Add verifiable credentials via deep link (direct and QR Code) and
via QR code
○ Display credentials locally—Issuer, issuer logo, credential name,
issuance date
○ Select and share credentials as JSON-LD via operating system
sharing mechanisms (copy to clipboard, save as file)
○ Delete credentials, backup and restore from file
Demo
● Login to a LMS or student portal
● Prompted to install eduWallet from Apple or
Google Play app stores
● First time setup of eduWallet
● (Simulated) Access credential via LMS / QR Code
/ Deep Link
● (Not demonstrated) Authenticate before
receiving credential
● View credentials (and share them)
Questions?
Brandon Muramatsu
mura@mit.edu
Willem van Valkenburg
w.f.vanvalkenburg@tudelft.nl

More Related Content

What's hot

Blockchain and banking
Blockchain and bankingBlockchain and banking
Blockchain and bankingAnisha Sachit
 
Blockchain overview, use cases, implementations and challenges
Blockchain overview, use cases, implementations and challengesBlockchain overview, use cases, implementations and challenges
Blockchain overview, use cases, implementations and challengesSébastien Tandel
 
OpenID for Verifiable Credentials
OpenID for Verifiable CredentialsOpenID for Verifiable Credentials
OpenID for Verifiable CredentialsTorsten Lodderstedt
 
Hyperledger Fabric in a Nutshell
Hyperledger Fabric in a NutshellHyperledger Fabric in a Nutshell
Hyperledger Fabric in a NutshellDaniel Chan
 
Blockchain technology and its impact on the supply chain
Blockchain technology and its impact on the supply chain  Blockchain technology and its impact on the supply chain
Blockchain technology and its impact on the supply chain Artur Gowin
 
La Blockchain pas à PaaS
La Blockchain pas à PaaSLa Blockchain pas à PaaS
La Blockchain pas à PaaSMicrosoft
 
How does blockchain work
How does blockchain workHow does blockchain work
How does blockchain workShishir Aryal
 
Global Future of Blockchain
Global Future of Blockchain Global Future of Blockchain
Global Future of Blockchain Melanie Swan
 
Blockchain technology
Blockchain technologyBlockchain technology
Blockchain technologyAayt Bahaa
 
OpenID Connect for W3C Verifiable Credential Objects
OpenID Connect for W3C Verifiable Credential ObjectsOpenID Connect for W3C Verifiable Credential Objects
OpenID Connect for W3C Verifiable Credential ObjectsTorsten Lodderstedt
 
Blockchain Security Issues and Challenges
Blockchain Security Issues and Challenges Blockchain Security Issues and Challenges
Blockchain Security Issues and Challenges Merlec Mpyana
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain TechnologyNimmy Solomon
 
Blockchain technology.pptx
 Blockchain technology.pptx Blockchain technology.pptx
Blockchain technology.pptxARNAV PATEL
 
Verifiable Credentials for Travel & Hospitality
Verifiable Credentials for Travel & HospitalityVerifiable Credentials for Travel & Hospitality
Verifiable Credentials for Travel & HospitalityEvernym
 
Hyperledger Indy tutorial
Hyperledger Indy tutorialHyperledger Indy tutorial
Hyperledger Indy tutorialssuser3993f3
 
Blockchain: The New Technology and Its Applications for Libraries
Blockchain: The New Technology and Its Applications for LibrariesBlockchain: The New Technology and Its Applications for Libraries
Blockchain: The New Technology and Its Applications for LibrariesBohyun Kim
 
Digital Certificate Verification based on blockchain ethereum
Digital Certificate Verification based on blockchain ethereumDigital Certificate Verification based on blockchain ethereum
Digital Certificate Verification based on blockchain ethereumnurhaniffah1
 
Understanding Proof of Work (PoW) and Proof of Stake (PoS) Algorithms
Understanding Proof of Work (PoW) and Proof of Stake (PoS) AlgorithmsUnderstanding Proof of Work (PoW) and Proof of Stake (PoS) Algorithms
Understanding Proof of Work (PoW) and Proof of Stake (PoS) AlgorithmsGautam Anand
 

What's hot (20)

Blockchain and banking
Blockchain and bankingBlockchain and banking
Blockchain and banking
 
Blockchain overview, use cases, implementations and challenges
Blockchain overview, use cases, implementations and challengesBlockchain overview, use cases, implementations and challenges
Blockchain overview, use cases, implementations and challenges
 
OpenID for Verifiable Credentials
OpenID for Verifiable CredentialsOpenID for Verifiable Credentials
OpenID for Verifiable Credentials
 
Hyperledger Fabric in a Nutshell
Hyperledger Fabric in a NutshellHyperledger Fabric in a Nutshell
Hyperledger Fabric in a Nutshell
 
Blockchain technology and its impact on the supply chain
Blockchain technology and its impact on the supply chain  Blockchain technology and its impact on the supply chain
Blockchain technology and its impact on the supply chain
 
La Blockchain pas à PaaS
La Blockchain pas à PaaSLa Blockchain pas à PaaS
La Blockchain pas à PaaS
 
Blockchain concepts
Blockchain conceptsBlockchain concepts
Blockchain concepts
 
How does blockchain work
How does blockchain workHow does blockchain work
How does blockchain work
 
Global Future of Blockchain
Global Future of Blockchain Global Future of Blockchain
Global Future of Blockchain
 
Blockchain technology
Blockchain technologyBlockchain technology
Blockchain technology
 
OpenID Connect for W3C Verifiable Credential Objects
OpenID Connect for W3C Verifiable Credential ObjectsOpenID Connect for W3C Verifiable Credential Objects
OpenID Connect for W3C Verifiable Credential Objects
 
Blockchain Security Issues and Challenges
Blockchain Security Issues and Challenges Blockchain Security Issues and Challenges
Blockchain Security Issues and Challenges
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain Technology
 
Blockchain technology.pptx
 Blockchain technology.pptx Blockchain technology.pptx
Blockchain technology.pptx
 
Verifiable Credentials for Travel & Hospitality
Verifiable Credentials for Travel & HospitalityVerifiable Credentials for Travel & Hospitality
Verifiable Credentials for Travel & Hospitality
 
Hyperledger Indy tutorial
Hyperledger Indy tutorialHyperledger Indy tutorial
Hyperledger Indy tutorial
 
Blockchain
BlockchainBlockchain
Blockchain
 
Blockchain: The New Technology and Its Applications for Libraries
Blockchain: The New Technology and Its Applications for LibrariesBlockchain: The New Technology and Its Applications for Libraries
Blockchain: The New Technology and Its Applications for Libraries
 
Digital Certificate Verification based on blockchain ethereum
Digital Certificate Verification based on blockchain ethereumDigital Certificate Verification based on blockchain ethereum
Digital Certificate Verification based on blockchain ethereum
 
Understanding Proof of Work (PoW) and Proof of Stake (PoS) Algorithms
Understanding Proof of Work (PoW) and Proof of Stake (PoS) AlgorithmsUnderstanding Proof of Work (PoW) and Proof of Stake (PoS) Algorithms
Understanding Proof of Work (PoW) and Proof of Stake (PoS) Algorithms
 

Similar to Enabling Digital Verification of Educational Achievements Through Open Standards

GDPR and IoT: What do you need to know?
GDPR and IoT: What do you need to know?GDPR and IoT: What do you need to know?
GDPR and IoT: What do you need to know?MicheleNati
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudUlf Mattsson
 
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...Konstantinos Demertzis
 
Blockchain and the Future of Digital Learning Credential Assessment and Manag...
Blockchain and the Future of Digital Learning Credential Assessment and Manag...Blockchain and the Future of Digital Learning Credential Assessment and Manag...
Blockchain and the Future of Digital Learning Credential Assessment and Manag...eraser Juan José Calderón
 
Mcis 2018 DEFeND Project
Mcis 2018 DEFeND Project Mcis 2018 DEFeND Project
Mcis 2018 DEFeND Project DEFeND Project
 
Analytics in Action - Data Protection
Analytics in Action - Data ProtectionAnalytics in Action - Data Protection
Analytics in Action - Data ProtectionLee Schlenker
 
Safeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningSafeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningUlf Mattsson
 
Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...
Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...
Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...Karlos Svoboda
 
ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...Ulf Mattsson
 
The Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarThe Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarEryk Budi Pratama
 
ISACA Houston - Practical data privacy and de-identification techniques
ISACA Houston  - Practical data privacy and de-identification techniquesISACA Houston  - Practical data privacy and de-identification techniques
ISACA Houston - Practical data privacy and de-identification techniquesUlf Mattsson
 
ico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdfico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdfyashapnt
 
Evolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyEvolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyUlf Mattsson
 
DWEL - Module 5 final.pptx
DWEL - Module 5 final.pptxDWEL - Module 5 final.pptx
DWEL - Module 5 final.pptxcaniceconsulting
 
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) planCWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) planCapgemini
 
141013 e id-budapest_sia_tobepublished
141013 e id-budapest_sia_tobepublished141013 e id-budapest_sia_tobepublished
141013 e id-budapest_sia_tobepublishedAlain Ducass
 
GUL Network Infrastructure
GUL Network InfrastructureGUL Network Infrastructure
GUL Network InfrastructureMuhammad Zeeshan
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRMatt Stubbs
 
A practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaA practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaUlf Mattsson
 

Similar to Enabling Digital Verification of Educational Achievements Through Open Standards (20)

GDPR and IoT: What do you need to know?
GDPR and IoT: What do you need to know?GDPR and IoT: What do you need to know?
GDPR and IoT: What do you need to know?
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
 
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
 
Blockchain and the Future of Digital Learning Credential Assessment and Manag...
Blockchain and the Future of Digital Learning Credential Assessment and Manag...Blockchain and the Future of Digital Learning Credential Assessment and Manag...
Blockchain and the Future of Digital Learning Credential Assessment and Manag...
 
Mcis 2018 DEFeND Project
Mcis 2018 DEFeND Project Mcis 2018 DEFeND Project
Mcis 2018 DEFeND Project
 
Analytics in Action - Data Protection
Analytics in Action - Data ProtectionAnalytics in Action - Data Protection
Analytics in Action - Data Protection
 
Safeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningSafeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learning
 
Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...
Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...
Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...
 
ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...
 
The Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarThe Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI Webinar
 
ISACA Houston - Practical data privacy and de-identification techniques
ISACA Houston  - Practical data privacy and de-identification techniquesISACA Houston  - Practical data privacy and de-identification techniques
ISACA Houston - Practical data privacy and de-identification techniques
 
ico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdfico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdf
 
Evolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyEvolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technology
 
DWEL - Module 5 final.pptx
DWEL - Module 5 final.pptxDWEL - Module 5 final.pptx
DWEL - Module 5 final.pptx
 
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) planCWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
 
Data security and privacy
Data security and privacyData security and privacy
Data security and privacy
 
141013 e id-budapest_sia_tobepublished
141013 e id-budapest_sia_tobepublished141013 e id-budapest_sia_tobepublished
141013 e id-budapest_sia_tobepublished
 
GUL Network Infrastructure
GUL Network InfrastructureGUL Network Infrastructure
GUL Network Infrastructure
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPR
 
A practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaA practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpa
 

More from Brandon Muramatsu

Sustainability of OER Initiatives: An Interactive Discussion
Sustainability of OER Initiatives: An Interactive DiscussionSustainability of OER Initiatives: An Interactive Discussion
Sustainability of OER Initiatives: An Interactive DiscussionBrandon Muramatsu
 
Bridging the Gap: Mixing approaches, content and tools to help college students
Bridging the Gap: Mixing approaches, content and tools to help college studentsBridging the Gap: Mixing approaches, content and tools to help college students
Bridging the Gap: Mixing approaches, content and tools to help college studentsBrandon Muramatsu
 
Federations & Backstage: Thoughts for a Geoscience Education Infrastructure
Federations & Backstage: Thoughts for a Geoscience Education InfrastructureFederations & Backstage: Thoughts for a Geoscience Education Infrastructure
Federations & Backstage: Thoughts for a Geoscience Education InfrastructureBrandon Muramatsu
 
The Connected Learning Initiative Quality at Scale in India
The Connected Learning Initiative Quality at Scale in IndiaThe Connected Learning Initiative Quality at Scale in India
The Connected Learning Initiative Quality at Scale in IndiaBrandon Muramatsu
 
The Connected Learning Initiative Quality at Scale in India
The Connected Learning Initiative Quality at Scale in IndiaThe Connected Learning Initiative Quality at Scale in India
The Connected Learning Initiative Quality at Scale in IndiaBrandon Muramatsu
 
Strategic Education Initiatives , MIT Open Learning
Strategic Education Initiatives, MIT Open LearningStrategic Education Initiatives, MIT Open Learning
Strategic Education Initiatives , MIT Open LearningBrandon Muramatsu
 
Open Embedded Assessments: Play, Author; Anywhere, Anytime
Open Embedded Assessments:Play, Author; Anywhere, AnytimeOpen Embedded Assessments:Play, Author; Anywhere, Anytime
Open Embedded Assessments: Play, Author; Anywhere, AnytimeBrandon Muramatsu
 
DXtera Enabling Digital Exchange
DXtera Enabling Digital ExchangeDXtera Enabling Digital Exchange
DXtera Enabling Digital ExchangeBrandon Muramatsu
 
Evaluating and Selecting Digital Learning Resources
Evaluating and Selecting Digital Learning ResourcesEvaluating and Selecting Digital Learning Resources
Evaluating and Selecting Digital Learning ResourcesBrandon Muramatsu
 
Connected Learning Initiative: Learning at Scale
Connected Learning Initiative: Learning at ScaleConnected Learning Initiative: Learning at Scale
Connected Learning Initiative: Learning at ScaleBrandon Muramatsu
 
CLIx-Connected Learning Intiative
CLIx-Connected Learning IntiativeCLIx-Connected Learning Intiative
CLIx-Connected Learning IntiativeBrandon Muramatsu
 
The Best of Both Worlds: Transforming OpenCourseWare in an age of Interactivity
The Best of Both Worlds: Transforming OpenCourseWare in an age of InteractivityThe Best of Both Worlds: Transforming OpenCourseWare in an age of Interactivity
The Best of Both Worlds: Transforming OpenCourseWare in an age of InteractivityBrandon Muramatsu
 
Innovative Educational Technology and Educational Infrastructure at MIT
Innovative Educational Technologyand Educational Infrastructureat MITInnovative Educational Technologyand Educational Infrastructureat MIT
Innovative Educational Technology and Educational Infrastructure at MITBrandon Muramatsu
 
Strategic Education Initiatives
Strategic Education InitiativesStrategic Education Initiatives
Strategic Education InitiativesBrandon Muramatsu
 
Workshop: Emerging Possibilities and Takeaways for KFUPM
Workshop: Emerging Possibilities and Takeaways for KFUPMWorkshop: Emerging Possibilities and Takeaways for KFUPM
Workshop: Emerging Possibilities and Takeaways for KFUPMBrandon Muramatsu
 
Workshop: Lessons from Online and edX / MITx Courses
Workshop: Lessons from Online and edX / MITx CoursesWorkshop: Lessons from Online and edX / MITx Courses
Workshop: Lessons from Online and edX / MITx CoursesBrandon Muramatsu
 
Workshop: Design Considerations for Online / Digital Courses
Workshop: Design Considerations for Online / Digital CoursesWorkshop: Design Considerations for Online / Digital Courses
Workshop: Design Considerations for Online / Digital CoursesBrandon Muramatsu
 
Workshop: Educational Technology Opportunities for KFUPM
Workshop: Educational Technology Opportunities for KFUPMWorkshop: Educational Technology Opportunities for KFUPM
Workshop: Educational Technology Opportunities for KFUPMBrandon Muramatsu
 
Backstage: What's Behind the Curtain
Backstage: What's Behind the CurtainBackstage: What's Behind the Curtain
Backstage: What's Behind the CurtainBrandon Muramatsu
 

More from Brandon Muramatsu (20)

Sustainability of OER Initiatives: An Interactive Discussion
Sustainability of OER Initiatives: An Interactive DiscussionSustainability of OER Initiatives: An Interactive Discussion
Sustainability of OER Initiatives: An Interactive Discussion
 
Bridging the Gap: Mixing approaches, content and tools to help college students
Bridging the Gap: Mixing approaches, content and tools to help college studentsBridging the Gap: Mixing approaches, content and tools to help college students
Bridging the Gap: Mixing approaches, content and tools to help college students
 
Federations & Backstage: Thoughts for a Geoscience Education Infrastructure
Federations & Backstage: Thoughts for a Geoscience Education InfrastructureFederations & Backstage: Thoughts for a Geoscience Education Infrastructure
Federations & Backstage: Thoughts for a Geoscience Education Infrastructure
 
The Connected Learning Initiative Quality at Scale in India
The Connected Learning Initiative Quality at Scale in IndiaThe Connected Learning Initiative Quality at Scale in India
The Connected Learning Initiative Quality at Scale in India
 
The Connected Learning Initiative Quality at Scale in India
The Connected Learning Initiative Quality at Scale in IndiaThe Connected Learning Initiative Quality at Scale in India
The Connected Learning Initiative Quality at Scale in India
 
Strategic Education Initiatives , MIT Open Learning
Strategic Education Initiatives, MIT Open LearningStrategic Education Initiatives, MIT Open Learning
Strategic Education Initiatives , MIT Open Learning
 
Open Embedded Assessments: Play, Author; Anywhere, Anytime
Open Embedded Assessments:Play, Author; Anywhere, AnytimeOpen Embedded Assessments:Play, Author; Anywhere, Anytime
Open Embedded Assessments: Play, Author; Anywhere, Anytime
 
DXtera Enabling Digital Exchange
DXtera Enabling Digital ExchangeDXtera Enabling Digital Exchange
DXtera Enabling Digital Exchange
 
Evaluating and Selecting Digital Learning Resources
Evaluating and Selecting Digital Learning ResourcesEvaluating and Selecting Digital Learning Resources
Evaluating and Selecting Digital Learning Resources
 
Online Recitation Sessions
Online Recitation SessionsOnline Recitation Sessions
Online Recitation Sessions
 
Connected Learning Initiative: Learning at Scale
Connected Learning Initiative: Learning at ScaleConnected Learning Initiative: Learning at Scale
Connected Learning Initiative: Learning at Scale
 
CLIx-Connected Learning Intiative
CLIx-Connected Learning IntiativeCLIx-Connected Learning Intiative
CLIx-Connected Learning Intiative
 
The Best of Both Worlds: Transforming OpenCourseWare in an age of Interactivity
The Best of Both Worlds: Transforming OpenCourseWare in an age of InteractivityThe Best of Both Worlds: Transforming OpenCourseWare in an age of Interactivity
The Best of Both Worlds: Transforming OpenCourseWare in an age of Interactivity
 
Innovative Educational Technology and Educational Infrastructure at MIT
Innovative Educational Technologyand Educational Infrastructureat MITInnovative Educational Technologyand Educational Infrastructureat MIT
Innovative Educational Technology and Educational Infrastructure at MIT
 
Strategic Education Initiatives
Strategic Education InitiativesStrategic Education Initiatives
Strategic Education Initiatives
 
Workshop: Emerging Possibilities and Takeaways for KFUPM
Workshop: Emerging Possibilities and Takeaways for KFUPMWorkshop: Emerging Possibilities and Takeaways for KFUPM
Workshop: Emerging Possibilities and Takeaways for KFUPM
 
Workshop: Lessons from Online and edX / MITx Courses
Workshop: Lessons from Online and edX / MITx CoursesWorkshop: Lessons from Online and edX / MITx Courses
Workshop: Lessons from Online and edX / MITx Courses
 
Workshop: Design Considerations for Online / Digital Courses
Workshop: Design Considerations for Online / Digital CoursesWorkshop: Design Considerations for Online / Digital Courses
Workshop: Design Considerations for Online / Digital Courses
 
Workshop: Educational Technology Opportunities for KFUPM
Workshop: Educational Technology Opportunities for KFUPMWorkshop: Educational Technology Opportunities for KFUPM
Workshop: Educational Technology Opportunities for KFUPM
 
Backstage: What's Behind the Curtain
Backstage: What's Behind the CurtainBackstage: What's Behind the Curtain
Backstage: What's Behind the Curtain
 

Recently uploaded

9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 

Recently uploaded (20)

9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 

Enabling Digital Verification of Educational Achievements Through Open Standards

  • 1. Digital Credentials Enabling Mobility and Verification of Educational Achievements Brandon Muramatsu, MIT Willem van Valkenburg, Delft University of Technology
  • 2. Today ● A brief intro to the Digital Credentials Consortium ● Two case studies ○ GDPR and Digital Credentials, Delft University of Technology ○ Open Source Learner Credential Wallet, MIT
  • 3. Digital Credentials Consortium Our mission is to create a trusted, distributed, and shared infrastructure that will become the standard for issuing, storing, displaying, and verifying academic credentials, digitally.
  • 4. DCC Founding Members Delft University of Technology (The Netherlands) Georgia Institute of Technology (USA) Harvard University (USA) Hasso Plattner Institute, University of Potsdam (Germany) Massachusetts Institute of Technology (USA) McMaster University (Canada) Tecnológico De Monterrey (Mexico) Technical University of Munich (Germany) University of California at Berkeley (USA) University of California, Irvine (USA) University of Milano-Bicocca (Italy) University of Toronto (Canada)
  • 5. DCC Guiding Principles Learners ● Learners retain primary control over their credentials. ● Learners’ consent is required for issuance of digital credentials. ● Learners decide to whom they grant access. ● Barriers to receiving and managing credentials are minimal to enable broad participation. Issuers ● Issuers control to whom they issue credentials, the particular achievement that the credential represents, and which credential options are available to the learner. ● Issuers can revoke credentials according to their institution’s policies. ● Barriers to issuing credentials are minimal to enable broad and diverse participation. Trust: ● Everyone is able to review how the infrastructure and processes work. ● Trust in the integrity of the credentials is established cryptographically. ● Credentials can be verified without consulting the original issuer.
  • 6. How does DCC do its work? ● Consortium of members with alignment to guiding principles, and each working in similar ways on digital credentials ● DCC does its work through open standards organizations primarily the W3C Verifiable Credentials for Education (W3C VC-EDU) Community Group ○ Coordinates with IMS Global on Comprehensive Learner Record and Open Badges v3 specifications ● Shared technical work through a Technical Working Group made up of DCC members ● Implementing Verifiable Credentials (VC) and Decentralized Identifiers (DID) specifications ○ Meet key DCC guiding principles of learner control
  • 7. Delft University of Technology
  • 9. General Data Protection Regulation (GDPR) The European Union's General Data Protection Regulation become binding in May 2018. Goal of GDPR: 1. to facilitate free movement of personal data between EU members states 2. to establish a framework of fundamental data rights protection. The legal framework creates a number of obligations resting on data controllers (entities determining the means and purpose of data processing) The legal framework creates a number of rights to data subjects (the natural persons to whom the personal data relates) to be enforced by data controllers. E.g. Article 16 GDPR – right to rectification, Article 17 GDPR – right to erasure (‘right to be forgotten’)
  • 10. Leading principles of GDPR Lawfulness, fairness and transparency organisations need to make sure their data collection practices don’t break the law and that they aren’t hiding anything from data subjects. Purpose limitation Organisations should only collect personal data for a specific purpose, clearly state what that purpose is, and only collect data for as long as necessary to complete that purpose. Data minimisation Organisations must only process the personal data that they need to achieve its processing purposes. Accuracy The accuracy of personal data is integral to data protection. The GDPR states that “every reasonable step must be taken” to erase or rectify data that is inaccurate or incomplete. Storage limitation Organisations need to delete personal data when it’s no longer necessary. Integrity and confidentiality (security) Personal data should be processed in a manner that ensures appropriate security of the personal data, including protection against unauthorised or unlawful processing and against accidental loss, destruction or damage, using appropriate technical or organisational measures. Accountability The controller shall be responsible for, and be able to demonstrate compliance with the above principles
  • 12. GDPR and Blockchain The GDPR is based on assumptions that creates tension with blockchain. GDPR Blockchain in relation to each personal data point there is at least one natural or legal person – the data controller – whom the subjects can address to enforce their rights under EU Data protection law. decentralizes to many actors and allocation of responsibility and accountability is burdensome. data can be modified or erased where necessary to comply with the legal requirements of GDPR Article 16 (right to rectification) and 17 (right to erasure (‘right to be forgotten’) Modification and erasure of data is made onerous to ensure data integrity and increase trust in the network.
  • 13.
  • 14. Personal data on the Blockchain? In the pilot we explored the following: ● Is data that is encrypted or hashed/ ‘anonymized’ still quality as personal data as per the GDPR requirements of anonymisation? ● How is the right to erasure/right to be forgotten dealt with in the pilot?
  • 15. The right to be forgotten is not an absolute right ● if a learner requests to be forgotten, Accredify deletes their personal data. The learner is the one who should contact institutes where they have personally shared their opencert file which could be still verified. ● What happens now is that Accredify deletes personal data from their system which is GDPR complaint. This is because the right to be forgotten does not extend to all the institutes where the learner shared their file. ● If a certificate is revoked and cannot be verified in the future that doesn’t say much – so it is good to add an explanation.
  • 16. Hashing, salt and peppering of personal data ● As long as the hash relates to something it is not anonymised. ● This is the current conflict within blockchain and GDPR and the interpretation of what is considered as anonymous.
  • 17. Open Source Learner Wallet MIT MIT Team Brandon Muramatsu Philipp Schmidt Gillian Walsh Dmitri Zagidulin
  • 18. About the Open Source Learner Wallet Project ● A key missing ingredient in a digital credential infrastructure ○ Prioritizes learner agency ○ Enables trust ○ Supports diverse institutions ● A learner credential wallet specification (May 2021) ● An open source learner wallet mobile app, eduWallet ● A pilot with U.S. institutions: ○ College Unbound, Georgia Tech and San Jose City College ○ MIT xPRO and University of North Texas / Concentric Sky
  • 19. Details on eduWallet An Open Source Learner Wallet ● Both Android and iOS versions ○ Going into pilot testing December 2021–January 2022 ● Key features ○ Login to secure wallet ○ Add verifiable credentials via deep link (direct and QR Code) and via QR code ○ Display credentials locally—Issuer, issuer logo, credential name, issuance date ○ Select and share credentials as JSON-LD via operating system sharing mechanisms (copy to clipboard, save as file) ○ Delete credentials, backup and restore from file
  • 20. Demo ● Login to a LMS or student portal ● Prompted to install eduWallet from Apple or Google Play app stores ● First time setup of eduWallet ● (Simulated) Access credential via LMS / QR Code / Deep Link ● (Not demonstrated) Authenticate before receiving credential ● View credentials (and share them)
  • 21. Questions? Brandon Muramatsu mura@mit.edu Willem van Valkenburg w.f.vanvalkenburg@tudelft.nl

Editor's Notes

  1. https://docs.google.com/document/d/1Rvnt_wi_pIeX9YXtjXMXHbTow8ZO_J5V/edit#
  2. College Unbound Small IHE serving low-income learners in degree completion programs San Jose City College Provides non-degree courses for high demand tech skills, has previously worked with MIT on their Technest program Georgia Tech Influential in DCC, piloting verifiable with training programs